Bonum Certa Men Certa

Let's Encrypt is Garbage, Albeit It's Disguised as 'Free' Privacy

Earlier this year (an unexplained incident, still): Techrights Urges Readers to Ask the Linux Foundation's Let's Encrypt (Backed by Companies That Give the NSA Back Doors) Some Hard But Legitimate Questions

Let's Encrypt address

Let's Encrypt LF connection

Let's Encrypt and LF

The signature for Let's Encrypt

Source: The latest-available IRS filing. See the IRS filing in full [PDF] for a lot more.

Summary: The 'Linux' Foundation in 'privacy' clothing is more like a monopoly disguised as non-profit while taking money from monopolies (to do their biddings in the most surveillance-intensive country in the entire world)

Yesterday we asserted (and then explained why) today's Linux Foundation -- or LF for short (one way to avoid the misleading name) -- works for monopolies, not Linux. It uses the "Linux" brand to market itself.



One thing that came from LF is a CA that issues loads and loads of certificates which expire after 3 months.

"The aspect nobody wishes to talk about is that the Let's Encrypt monopoly is reinforcing monopoly and monopolies (Let's Encrypt itself is fast becoming a monopoly and it helps large companies further monpolise and thus centralise the Web)."Look who backs this. Look who funds this. Look where the code is hosted (proprietary Microsoft GitHub). Even the site itself is outsourced to proprietary Microsoft GitHub...

Let's Encrypt is partly funded by Microsoft/GitHub and various other unsavoury companies notorious for their back doors (we can name more than a handful).

So much for security, considering how close Microsoft and the NSA have long been.

But that's not the point. That's not the most important thing.

The aspect nobody wishes to talk about is that the Let's Encrypt monopoly is reinforcing monopoly and monopolies (Let's Encrypt itself is fast becoming a monopoly and it helps large companies further monpolise and thus centralise the Web).

It may sound peculiar at first, but considering the FIDO situation we've seen it elsewhere as well. Much power can be gained -- sometimes money follows -- by making oneself the de facto standard. Then abuse and chaos may ensue, as monopolies need not compete and appease/please anyboby.

Yesterday the Let's Encrypt site published a blog post which bears a rather meaningless if not misleading headline (because a suitable headline would likely upset people right from the get-go).

Put in simple terms, sites that adopt HTTPS with the 'free' (so-called, hence scare quotes) Let's Encrypt will become inaccessible to a lot of visitors. In the name of fake 'privacy', which does nothing about spying at the endpoints (like data sales to brokers). People who think HTTPS 'means privacy' should remind themselves that companies like Facebook -- a Let's Encrypt sponsor -- use HTTPS and it does nothing to prevent Facebook from assaulting privacy like Microsoft assaults love itself. HTTPS helps secure things not at the endpoints but during transit.

LWN's headline was vastly more informative than the waffle from Let's Encrypt and it said:

Fallout from upcoming Let's Encrypt certificate changes



As described in this Let's Encrypt blog entry, certificates issued by Let's Encrypt will soon be signed solely by that organization's own root certificate, which is accepted by all modern browsers. There is one little catch, though: versions of Android prior to 7.1.1 (released in late 2016) do not recognize that certificate and will start throwing errors. "Currently, 66.2% of Android devices are running version 7.1 or above. The remaining 33.8% of Android devices will eventually start getting certificate errors when users visit sites that have a Let’s Encrypt certificate. In our communications with large integrators, we have found that this represents around 1-5% of traffic to their sites." There appears to be little to be done about this problem other than to encourage owners of older Android devices to install Firefox.


It quotes part of what Jacob Hoffman-Andrews said, followed by: "Hopefully these numbers will be lower by the time DST Root X3 expires next year, but the change may not be very significant."

Next year?

Let's Encrypt moneyJust one year? Hardly anything would change by then. See the comments in LWN. One person said: "Rooting old phones requires erasing them. I'd hazard that the users of those phones would be cautious about that (data loss), as opposed to current phones (loss of access to baking and game apps)."

They're pushing people to buy new so-called 'phones' (spying devices). And further down it says: "Plausibly deniable way to send users up the upgrade treadmill. C'mon, Android users! Throw away your devices, again!"

Why would anyone wish to turn away users in the name of fake 'privacy' or dubious levels of confidentiality? If the Let's Encrypt folks somehow hand over keys to the government (e.g. under Trump NSLs), then what good is it really? It not only helps monopolies but also militant empires.

Let's Encrypt may claim to be a liberating and democratising force, but that's assuming it does what it says on the tin.

An encrypted systems specialist elaborated on this. "Trust should only exist between the provider of data and the consumer," he said to us. "Any other third party introduced into the system is an attack against privacy, security, and autonomy. Don't let quacks convince you otherwise."

"The discussion should lead the user to devices and browsers that let them have a local list of public keys they trust. That's the basic function of TLS anyways. The concept of a CA needs to be binned altogether. You can still trust certs yourself on Firefox. Just ignore the browser warnings."

He added that "what [we] should tell users is to start trusting self-signed certificates in favour of certs provided by CAs. Let's Encrypt is a vehicle for maintaining the trust monopoly. It's free so people blindly just use it, without realising they're just further entrenching the trust monopoly. Anyone can generate TLS certs with openssl (or even more secure libressl; libressl is by the OpenBSD team. It's the best TLS software around. There's nothing magical about TLS certificates. If someone has something like WordPress, you can just use libressl to generate your own certs and then put a banner on the top of your info page on your website asking users to trust whichever cert you generated and hasn't expired [and] what we really need in a truly security-and-privacy respecting Web browser is one that rejects all TLS certificates by default and only accepts certs the user agrees to accept. Right now the situation is the opposite of what it should be. Users have monopolised "trust providers" dictate which certs they accept. Kind of how you do when you set up SSH. You block all public keys by default and only allow ones you trust yourself. And you, the user, have full control of your trust system. Delegation of trust mechanisms to third parties is flagrant stupidity in any security system. In summary: right now you, the user, have a dictator ordering you whom you can and cannot trust. This is absurd. Your devices and software shouldn't stop functioning when you want to take back control over your trust. The current system is a dictatorship of CAs forcing people to give up control over their trust (and by extension, their security and privacy). These are abuses against articles 12 and 19 of the Universal Declaration of Human Rights."

Don't forget that Let's Encrypt is US-based and monopolies-backed. They're not a charity, not a nonprofit either. They have motivations that aren't altruistic and we know who pays the salaries (not friends and allies of privacy, sometimes foes of it). They call themselves "[a] nonprofit Certificate Authority providing TLS certificates to 225 million websites." The Linux Foundation also calls itself "nonprofit", but we know that's a lie.

The encrypted systems specialist said he "[had] forgot[ten] to mention one other big point. The fact you can't block CAs in your browser and certain certificates is evidence enough of the malice behind the design and implementation of the web today."

The incidents of March (earlier this year) could be seen as an eye-opener. They never bothered explaining why they had issued millions of bad certificates, which they later revoked; they didn't explain what actually caused this incident and what was done about it.

As a side note, the SELinux project of Red Hat (now IBM) used to issue monthly declarations about no government interventions/involvement. Those stopped years ago. What is it they say about canaries?

"I have never seen any letsencrypt documentation say they have canaries," oiaohm wrote this morning, "and if you know USA law on the matter canaries is basically false. One of the USA encrypted email systems that is shutdown now had canaries and when the NSA with NSL stepped in they were forbid from using them. So their end users knew nothing."

A lot more discussion regarding this issue can be found in tomorrow's IRC logs.

Comments

Recent Techrights' Posts

Over at Tux Machines...
GNU/Linux news for the past day
Governments That Financially Benefit (Profit) From the EPO Have a Long History of Covering Up Fraud and Corruption at the EPO
Many people are aware of it, even some of the biggest EPO stakeholders
 
The Register MS Still Occasionally Uses Slop
some articles don't use real images
Links 10/11/2025: "Scam Altman Gets Served Subpoena" and "China will Rule Renewable Energy"
Links for the day
ubuntupit.com Has Paused the LLM Slop (for Now)
No slopfarm ever offered any real value
More Media Coverage From Austria Regarding Cocaine Use by EPO Management
The ultimate goal is full accountability
Ponzi Economics and the Media's Role in Defending Ponzi Economics
We occasionally notice weak or almost-non-existent coverage regarding the economy
Links 10/11/2025: Very High Windows TCO and XBox Continues to Languish
Links for the day
IRC Proceedings: Sunday, November 09, 2025
IRC logs for Sunday, November 09, 2025
Our Time in London
10 Days Ago We Were Down in London
Giving Red Hat a Second Life and Second Chance: Drop the LLM Slop, Stop Publishing Promotion of LLMs or Text Made by LLMs
For Red Hat to earn more trust it needs to quit participating in the biggest "pump and dump" pyramid scheme since the 1990s
Gemini Links 09/11/2025: Garden Room Complete, FreeBSD 15.0 on the ThinkPad T480, and Known Gemini Caspules Sorted by Number of URLs
Links for the day
Links 09/11/2025: Fung-wong Strikes Maharlika, "Open" "AI" Wants Taxpayers to Give It Bailout Money
Links for the day
Links 09/11/2025: "Avoid MSI Graphics Like the Plague", Harms of Social Control Media More Widely Recognised
Links for the day
Rocky Linux's Embrace of Mindless Cargo Cults Will Harm Rocky Linux in the Long Run
focus on technology, not marketing that defrauds many people and plagiarises many producers
Many of Red Hat's Official Blog Posts Seem to be Fake, Written at Least Partly by Bots (LLM Slop)
Can one trust Red Hat on technical things if it cannot even write words?
Suggestions Regarding Techrights Search
In some cases, Daily Links also serve to obscure our original articles
"Open" "AI" is Going Bankrupt, Appealing for Government Bailout
The writings have been on the wall for years
Reaffirming Rumours of More Microsoft Layoffs, Halo Impacted, XBox Business Winding Down
XBox has a huge target painted on its bum
"Secure Boot": Stop Trying to Boot Into GNU/Linux, Use Vista 11 Instead
It's all about reducing the user's cybersecurity under the false guise of improving it
This is What We Always Wanted to Spend Our Time on
2026 will probably be our most productive ever
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, November 08, 2025
IRC logs for Saturday, November 08, 2025
LowEndBox Resorts to Ableism to Smear Software Freedom
Not some "low-level" pundit but an administrator
IBM is Destroying Red Hat (by Extension, It Also Harms GNU/Linux)
IBM is where things come to die, more so in the past decade or so
Austrian Media Coverage of Luis Berenguer's (Top EPO Official) Getting Busted for Cocaine
This wasn't some rich tourist caught by cops, it was a local official whom they busted
This Coming Thursday EPO Staff Meets Online to Discuss the Salaries Going Down While Stoned Managers Increase Their Own
compensation going down relative to inflation and other factors
Misinformation of IBM Spread via LLM Slop
Since a lot of sites now rely on LLMs we can expect the corporations' lies to be perpetuated by bots. That includes the myths of IBM Red Hat.
Gemini Links 09/11/2025: File Managers and DPC Commissioner
Links for the day
Links 08/11/2025: Climate Talk Unfruitful, OldVersion.com Archive Facing Shutdown
Links for the day
IBM is Eliminating Red Hat Like It Eliminated Tivoli and Eliminated Cognos
Be wary of IBM
Quitting One's Job Isn't Forbidden, Right?
it's important to remind people that leaving one's job is perfectly OK
Being Absent/Missing From Social Control Media is Not a Sign of Weakness
Broadly speaking, social control media is for losers
Empathy Online
I recently learned from someone that running his Web site might hurt some feelings, even if the writings are truthful
Our Site Search Increases Our Editorial and Informational Independence
Implementing our search facility is a long-term investment
Advocates of GNU/Linux and the Uphill Battles Behind Us
GNU/Linux felt like "activism" 20 years ago. Now it's mainstream.
Cybersecurity Means Real Security, Not Back Doors
Standing our ground on technology and cybersecurity is an uncompromisable stance
Links 08/11/2025: Disinformation Crisis, Denmark Recognises Threats Associated With Social Control Media
Links for the day
The Free Software Foundation (FSF) is Besieged for the Times It Does the Right Things
As that upsets rich people's interests (and they were, at times, sponsors)
Links 08/11/2025: Technical and Financial GAFAM Woes and Arrests of Journalists by Despots
Links for the day
Like SUSE, IBM Red Hat Seems to be Using LLM Slop to Write Fake (Bot-Generated) Blog Posts
IBM Red Hat keeps promoting slop
Corruption is a Reality, It's Not a Dirty or a Strong Word
Corruption is a topic some newspapers shy away from
How German Media Covered Cocainegate at The European Patent Office (EPO)
At some point we'll ask that same press to revisit the issue and this time comment on the EPO connection
Our Launch of Techrights Search Has Been Successful (So Far)
There are about 50,000 articles indexed there, going 19+ years back
Daniel Pocock Explains Social Engineering in Debian and Other Communities Increasingly Controlled by "Barons"
Communities are not corporations
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, November 07, 2025
IRC logs for Friday, November 07, 2025
Rosanna Yuen & GNOME community triple tricked
Reprinted with permission from Daniel Pocock
Adrian & Diana von Bidder-Senn, Debian: detailed history of a death
Reprinted with permission from Daniel Pocock
Crypto AG tricked ETH Zurich student internship
Reprinted with permission from Daniel Pocock
An Old Story of Fraud at the EPO in the Netherlands (and How the Dutch Government Facilitated It)
We've already mentioned several other scandals where the the Dutch government engaged in fraud and passive corruption
Voicing Concerns About European Patent Office (EPO) in Rijswijk
The report is dated yesterday
Gemini Links 08/11/2025: KeePassRX and Pluribus
Links for the day
IBM Layoffs Not Done, Terminations of Staff in India, Brazil, and Mexico Reported
This hopefully answers questions such as, "do the layoffs only impact US and Canada?"